An issue was discovered in Object First Ootbi BETA build 1.0.7.712. Management protocol has a flow which allows a remote attacker to execute arbitrary Bash code with root privileges. The command that sets the hostname doesn't validate input parameters. As a result, arbitrary data goes directly to the Bash interpreter. An attacker would need credentials to exploit this vulnerability. This is fixed in Object First Ootbi BETA build 1.0.13.1611.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://objectfirst.com/security/of-20221024-0001/ |
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2022-11-07T00:00:00
Updated: 2024-08-03T14:01:31.361Z
Reserved: 2022-11-07T00:00:00
Link: CVE-2022-44794
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-11-07T04:15:09.493
Modified: 2024-11-21T07:28:27.963
Link: CVE-2022-44794
Redhat
No data.